Mobile Ad Hoc Network Reactive Routing Protocol to Mitigate Misbehavior Node
Keywords:MANETs, errant node, limited resources, circuitous routes.
Mobile ad hoc networks (MANETs) are decentralised and self-organizing computer networks in which nodes are free to come and go and are randomly placed throughout a wireless communication region. The unpredictable and ever-changing topology of a network is a direct result of its mobile nodes. MANET's adaptability and ability to self-organize make it ideal for use in industries where mistakes could have serious consequences, such as medicine, transportation, and the armed forces, where even a single miscommunication could have lethal consequences. Therefore, it's crucial that all data transfers in this sector be encrypted. Routing is a vital component of data communication networks. To put it simply, a network protocol is a set of rules for However, in a hostile environment, the cooperative nature of the nodes in a network can't be assumed, and hence route selection in MANETs fails. When intermediate nodes drop or refuse to forward packets, it causes misbehaviour at the network layer. But because to resource limitations, packets may potentially be dropped by intermediate nodes. In this paper, we examine malicious routing behaviour in a mobile ad hoc network (MANET). By minimising all potential causes of packet drop owing to limited resources, our proposed "Reactive Routing Protocol to Mitigate Misbehavior node" can reliably identify the malicious node. The proposed technique mitigates misbehaving nodes with less overhead than existing secure knowledge algorithms, as shown by analytical and simulation findings.
Sana, Afreen Begum, Farheen Iqbal, and Arshad Ahmad Khan Mohammad. "Quality of service routing for multipath manets." In 2015 International Conference on Signal Processing and Communication Engineering Systems, pp. 426-431. IEEE, 2015.
Siddiqua, Ayesha, Kotari Sridevi, and Arshad Ahmad Khan Mohammed. "Preventing black hole attacks in MANETs using secure knowledge algorithm." 2015 International Conference on Signal Processing and Communication Engineering Systems. IEEE, 2015.
Sultana, Towheed, Arshad Ahmad Khan Mohammad, and Nikhil Gupta. "Importance of the Considering Bottleneck Intermediate Node During the Intrusion Detection in MANET." In Research in Intelligent and Computing in Engineering, pp. 205-213. Springer, Singapore, 2021.
Mohammad, Arshad Ahmad Khan, Ali Mirza Mahmood, and Srikanth Vemuru. "Intentional and unintentional misbehaving node detection and prevention in mobile ad hoc network." International Journal of Hybrid Intelligence 1, no. 2-3 (2019): 239-267.
Mohammad, Arshad Ahmad Khan, Ali Mirza Mahmood, and Srikanth Vemuru. "Energy-Aware Reliable Routing by Considering Current Residual Condition of Nodes in MANETs." In Soft Computing in Data Analytics, pp. 441-452. Springer, Singapore, 2019.
Mohammad, Arshad Ahmad Khan, Ali Mirza, and Srikanth Vemuru. "Cluster based mutual authenticated key agreement based on chaotic maps for mobile ad hoc networks." Indian Journal of Science and Technology 9 (2016): 26.
Mohammad, Arshad Ahmad Khan, Ali Mirza, and Mohammed Abdul Razzak. "Reactive energy aware routing selection based on knapsack algorithm (RER-SK)." In Emerging ICT for Bridging the Future-Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2, pp. 289-298. Springer, Cham, 2015.
Mohammad, Arshad Ahmad Khan, Ali Mirza, and Srikanth Vemuru. "Analytical Model for Evaluating the Bottleneck Node in MANETs." Indian Journal of Science and Technology 9 (2016): 31.
Mohammad, Arshad Ahmad Khan, Ali Mirza, and Srikanth Vemuru. "Energy aware routing for manets based on current processing state of nodes." Journal of Theoretical and Applied Information Technology 91, no. 2 (2016): 340.
Abdul, Arif Mohammad, Arshad Ahmad Khan Mohammad, P. Venkat Reddy, Praveena Nuthakki, Rakesh Kancharla, Rahul Joshi, and N. Kannaiya Raja. "Enhancing Security of Mobile Cloud Computing by Trust-and Role-Based Access Control." Scientific Programming (2022).
Mohammad, Arshad Ahmad Khan, Et Al. "Efficient Mobile Sink Location Placement By Residual Status In WSN To Enhance The Network Lifetime." Journal of Engineering Science and Technology 16.6 (2021): 4779-4790.
Sastry, M. Kiran, Arshad Ahmad Khan Mohammad, and Mohammad Abdul Arif. "Optimized Energy-efficient Load Balance Routing Protocol for Wireless Mesh Networks." International Journal of Advanced Computer Science and Applications 12.8 (2021).
Arshad Ahmad Khan Mohammad, Towheed Sultana” Evaluation Of Performance Degradation Due To The Presence Of Bottleneck Intermediate Node In Communication Path In Manet” International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-8 Issue-4, April 2019
Mohammad Mohammad, Aleem Mohammed and C Atheeq, “Prior Bush Fire Identification Mechanism Based on Machine Learning Algorithms” International Journal of Artificial Intelligence and Applications, Vol.13, No.4, July 2022
C Atheeq, M Munir Ahamed Rabbani, “CACK—A Counter Based Authenticated ACK to Mitigate Misbehaving Nodes from MANETs” Recent Advances in Computer Science and Communications 12, 2021.
C Atheeq, M Munir Ahamed Rabbani, “Secure Data transmission in integrated internet MANETs based on effective trusted knowledge algorithm” Indian Journal of Science and Technology. Vol. 9 No. 47, Dec 2016
C. Atheeq, Ahamed Rabbani, “Secure Intelligence Algorithm for data transmission in Integrated Internet MANET” International Journal of Computer Science and Applications, Vol. 14, No. 2, pp. 142 – 163, 2017
Krishna, N. ., R., A. ., John, N. M. ., & Kurian, S. M. . (2023). Training and Classification of PCA with LRM model for Diabetes Prediction . International Journal on Recent and Innovation Trends in Computing and Communication, 11(4s), 08–15. https://doi.org/10.17762/ijritcc.v11i4s.6302
Prof. Barry Wiling. (2017). Monitoring of Sona Massori Paddy Crop and its Pests Using Image Processing. International Journal of New Practices in Management and Engineering, 6(02), 01 - 06. https://doi.org/10.17762/ijnpme.v6i02.54
Sharma, R., Dhabliya, D. Attacks on transport layer and multi-layer attacks on manet (2019) International Journal of Control and Automation, 12 (6 Special Issue), pp. 5-11.
How to Cite
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
All papers should be submitted electronically. All submitted manuscripts must be original work that is not under submission at another journal or under consideration for publication in another form, such as a monograph or chapter of a book. Authors of submitted papers are obligated not to submit their paper for publication elsewhere until an editorial decision is rendered on their submission. Further, authors of accepted papers are prohibited from publishing the results in other publications that appear before the paper is published in the Journal unless they receive approval for doing so from the Editor-In-Chief.
IJISAE open access articles are licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. This license lets the audience to give appropriate credit, provide a link to the license, and indicate if changes were made and if they remix, transform, or build upon the material, they must distribute contributions under the same license as the original.